8 research outputs found

    A Framework for Semi-automated Web Service Composition in Semantic Web

    Full text link
    Number of web services available on Internet and its usage are increasing very fast. In many cases, one service is not enough to complete the business requirement; composition of web services is carried out. Autonomous composition of web services to achieve new functionality is generating considerable attention in semantic web domain. Development time and effort for new applications can be reduced with service composition. Various approaches to carry out automated composition of web services are discussed in literature. Web service composition using ontologies is one of the effective approaches. In this paper we demonstrate how the ontology based composition can be made faster for each customer. We propose a framework to provide precomposed web services to fulfil user requirements. We detail how ontology merging can be used for composition which expedites the whole process. We discuss how framework provides customer specific ontology merging and repository. We also elaborate on how merging of ontologies is carried out.Comment: 6 pages, 9 figures; CUBE 2013 International Conferenc

    Reverse Proxy Framework using Sanitization Technique for Intrusion Prevention in Database

    Full text link
    With the increasing importance of the internet in our day to day life, data security in web application has become very crucial. Ever increasing on line and real time transaction services have led to manifold rise in the problems associated with the database security. Attacker uses illegal and unauthorized approaches to hijack the confidential information like username, password and other vital details. Hence the real time transaction requires security against web based attacks. SQL injection and cross site scripting attack are the most common application layer attack. The SQL injection attacker pass SQL statement through a web applications input fields, URL or hidden parameters and get access to the database or update it. The attacker take a benefit from user provided data in such a way that the users input is handled as a SQL code. Using this vulnerability an attacker can execute SQL commands directly on the database. SQL injection attacks are most serious threats which take users input and integrate it into SQL query. Reverse Proxy is a technique which is used to sanitize the users inputs that may transform into a database attack. In this technique a data redirector program redirects the users input to the proxy server before it is sent to the application server. At the proxy server, data cleaning algorithm is triggered using a sanitizing application. In this framework we include detection and sanitization of the tainted information being sent to the database and innovate a new prototype.Comment: 9 pages, 6 figures, 3 tables; CIIT 2013 International Conference, Mumba

    Image Registration based on Support Vector Machine for Tampering Localization

    No full text
    Different technologies are available on web. In the era of internet communication, systems should able to protect content such as pictures, videos against malicious modifications during their transmission. One of the important problems addressed in this is the authentication of the image received in a Communication. Tampering detection has significance in authentication of image. This paper presents support vector machine (SVM) based tampering detection system. In this a robust alignment (registration) method is proposed which makes use of an image hash component based on the Bag of Features (BOF) paradigm to localize the tampering. These BOF are clustered for effective image alignment. The support vector machine is optimal partitioning based linear classifier and at least theoretically better other classifier because only small numbers of classes required during classification SVM. The proposed signature is attached to the image before transmission and then analyzed at destination to recover the geometric transformations which have been applied to the received image. A block-wise tampering detection which uses histograms of oriented gradients (HOG) presentation is proposed. The proposed approach obtains better margin in providing an overall enhanced performance by reducing the training time while maintaining the accuracy

    Natural pigment betacyanin as tracking dye for gel electrophoresis

    Get PDF
    Several dyes including bromophenol blue are used as tracking dye in gel electrophoresis. The stability of betacyanin extracted from spinach vine fruit (Basella rubra L.) was studied in relation to degradative factors such as pH ranging from 2 to 12 and at 100ºC. Betacyanin pigment was found to be stable at pH range 3-8 while the stability of the pigment at high temperature was found to be moderate. The effectiveness of betacyanin as a tracking dye was checked along with the bromophenol blue for agarose gel electrophoresis. The present study revealed that betacyanin from spinach fruit can be a potential alternative to conventional dye like bromophenol blue used in the loading dye preparation for agarose gel electrophoresis

    Natural pigment betacyanin as tracking dye for gel electrophoresis

    No full text
    23-26Several dyes including bromophenol blue are used as tracking dye in gel electrophoresis. The<span style="mso-ansi-language: EN-IN;mso-fareast-language:EN-IN"> stability of betacyanin extracted from spinach vine fruit (Basella rubra L.) was studied in relation to degradative factors such as pH ranging from 2 to 12 and at 100ºC. Betacyanin pigment was found to be stable at pH range 3-8 while the stability of the pigment at high temperature was found to be moderate. The effectiveness of betacyanin as a tracking dye was checked along with the bromophenol blue for agarose gel electrophoresis. The present study revealed that betacyanin from spinach fruit can be a potential alternative to conventional dye like bromophenol blue used in the loading dye preparation for agarose gel electrophoresis. </span
    corecore